General

  • Target

    3c8c163a3be06fac9473d38e0c739206_JaffaCakes118

  • Size

    24.9MB

  • Sample

    240513-zshf2sea85

  • MD5

    3c8c163a3be06fac9473d38e0c739206

  • SHA1

    4141775e93ff4592d42cab2b8386e0f873ebddbf

  • SHA256

    cbb8bbc5a1bb603a019eaf2aaa06314be37b18acb0e4ecca25250f8f33a638c7

  • SHA512

    c97225c94e6291fce5b355b18ed86c5efa3edd0154f2425b13d2e662b61e3976f2ce2176d7f18904318be44cfe8bd88f48561a78f74e320f83ff36494ef99569

  • SSDEEP

    393216:XRRgO81/LcBZ5agn4GVOnY1ASjL4JHXBl/RNWNwZlGCNntrZdOW5uEezv7P:hRgdLcBZ5aZG8d8L2BluNsNtriT7TP

Malware Config

Targets

    • Target

      3c8c163a3be06fac9473d38e0c739206_JaffaCakes118

    • Size

      24.9MB

    • MD5

      3c8c163a3be06fac9473d38e0c739206

    • SHA1

      4141775e93ff4592d42cab2b8386e0f873ebddbf

    • SHA256

      cbb8bbc5a1bb603a019eaf2aaa06314be37b18acb0e4ecca25250f8f33a638c7

    • SHA512

      c97225c94e6291fce5b355b18ed86c5efa3edd0154f2425b13d2e662b61e3976f2ce2176d7f18904318be44cfe8bd88f48561a78f74e320f83ff36494ef99569

    • SSDEEP

      393216:XRRgO81/LcBZ5agn4GVOnY1ASjL4JHXBl/RNWNwZlGCNntrZdOW5uEezv7P:hRgdLcBZ5aZG8d8L2BluNsNtriT7TP

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks known Qemu files.

      Checks for known Qemu files that exist on Android virtual device images.

    • Checks known Qemu pipes.

      Checks for known pipes used by the Android emulator to communicate with the host.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Queries information about running processes on the device

      Application may abuse the framework's APIs to collect information about running processes on the device.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Checks if the internet connection is available

    • Queries the unique device ID (IMEI, MEID, IMSI)

    • Reads information about phone network operator.

    • Target

      boy.skin

    • Size

      412KB

    • MD5

      2585a5a4046a56ff6952011746975411

    • SHA1

      485834eaf62e72e6e39b80c078296e858fc4b918

    • SHA256

      347c4d2f2ccf3f025f69df11269b0efc0955526c0f8be86ba773da10c69d631f

    • SHA512

      1790e78cba6c25532c134a960feb58a1631a97ea474f3fa178a28b8ddd2aefd1248ea88a492c182e03ffe5a351ebd67bca51bc63ba88c1c9a28d581f98903bf4

    • SSDEEP

      12288:oV2LSBVpS0e4/CFPLBNqvB32UENnpFQQcbQp9bv5:oV2L8p4aUBNKB2JZpFQQiQp9bv5

    Score
    1/10
    • Target

      girl.skin

    • Size

      403KB

    • MD5

      449c31c221381da03a9bdd50ab382667

    • SHA1

      8da871cfbed4e68fe2286c6c4a7bdea5b9257730

    • SHA256

      b0346ba1fcf0a369ebb9d507e5bce9090f8757665b04f833a5bea1f993408d40

    • SHA512

      2977a3e3e4724dbd327f56c87eb6a98ac7ee00557d0b02c852bb45a42680d01fb33e0d6fda45fce49f6b23aa2c230eb639aa6141d7bd4ccc3aa2ddb0b199e71f

    • SSDEEP

      12288:5eyLWjwxsNT/zVyBBLG3BG8ukSqb2sINuF:YyLJxshz8BBLG3BG8u2b0NuF

    Score
    1/10

MITRE ATT&CK Mobile v15

Tasks